Welcome to ExamTopics
ExamTopics Logo
- Expert Verified, Online, Free.
exam questions

Exam 312-50v12 All Questions

View all questions & answers for the 312-50v12 exam

Exam 312-50v12 topic 1 question 111 discussion

Actual exam question from ECCouncil's 312-50v12
Question #: 111
Topic #: 1
[All 312-50v12 Questions]

Johnson, an attacker, performed online research for the contact details of reputed cybersecurity firms. He found the contact number of sibertech.org and dialed the number, claiming himself to represent a technical support team from a vendor. He warned that a specific server is about to be compromised and requested sibertech.org to follow the provided instructions. Consequently, he prompted the victim to execute unusual commands and install malicious files, which were then used to collect and pass critical information to Johnson’s machine.
What is the social engineering technique Steve employed in the above scenario?

  • A. Diversion theft
  • B. Quid pro quo
  • C. Elicitation
  • D. Phishing
Show Suggested Answer Hide Answer
Suggested Answer: B 🗳️

Comments

Chosen Answer:
This is a voting comment (?) , you can switch to a simple comment.
Switch to a voting comment New
Vincent_Lu
Highly Voted 1 year, 4 months ago
Selected Answer: C
A. Diversion theft: A technique involving distraction to commit theft or stealing. B. Quid pro quo: An exchange where one party provides value in return for a benefit. C. Elicitation: Gathering information through skilled questioning or social engineering. D. Phishing: Fraudulent technique using deception to obtain sensitive information.
upvoted 9 times
...
fortinetmaster
Highly Voted 1 year, 7 months ago
Selected Answer: B
Correct B: Quid pro quo CEH Book v12 Page 1341 Attackers call numerous random numbers within a company, claiming to be from technical support. They offer their service to end users in exchange for confidential data or login credentials
upvoted 8 times
...
Carl_Chang
Most Recent 2 days, 10 hours ago
The social engineering technique employed by Johnson in the scenario you described is more aligned with **"Quid pro quo."** In this context, the attacker pretends to be from a legitimate source (a technical support team) and offers a service (warning about an impending server compromise) in exchange for the victim taking specific actions (executing unusual commands and installing malicious files). This technique often involves an exchange where the attacker provides a benefit or service to the victim, who in turn provides sensitive information or access. While "Elicitation" refers to techniques used to gather information without the victim realizing it, in this case, the direct exchange and manipulation for a specific action suggest that Quid pro quo is a better fit.
upvoted 1 times
...
Binx
3 months, 2 weeks ago
B. Quid pro quo In this scenario, Johnson pretends to be from a technical support team and warns the target about a supposed threat. He then instructs the target to execute certain commands and install malicious files, offering the supposed benefit of preventing a server compromise. This exchange of providing help in return for the execution of malicious instructions is characteristic of quid pro quo in social engineering.
upvoted 1 times
...
ametah
5 months ago
Selected Answer: B
Quid Pro Quo Quid pro quo is a Latin phrase that meaning “something for something.” In this technique, attackers keep calling random numbers within a company, claiming to be calling from technical support. This is a baiting technique where attackers offer their service to end-users in exchange of confidential data or login credentials. CEHv12 Module 09 Social Engineering Page 1348
upvoted 1 times
...
insaniunt
10 months, 4 weeks ago
Selected Answer: B
B. Quid pro quo
upvoted 1 times
...
hellooooooods
1 year ago
Selected Answer: B
In this technique, attackers keep calling random numbers within a company, claiming to be calling from technical support. This is a baiting technique where attackers offer their service to end-users in exchange of confidential data or login credentials
upvoted 1 times
...
IPconfig
1 year ago
Selected Answer: B
Quid Pro Quo an attacker gathers random phone numbers of the employees of a target organization. They then start calling each number, pretending to be from the IT department. The attacker eventually finds someone with a genuine technical issue and offers their service to resolve it. The attacker can then ask the victim to follow a series of steps and to type in the specific commands to install and launch malicious files that contain malware designed to collect sensitive information
upvoted 2 times
...
Attila777
1 year, 1 month ago
definetly C. elicitation: In requirements engineering, requirements elicitation is the practice of researching and discovering the requirements of a system from users, customers, and other stakeholders. The practice is also sometimes referred to as "requirement gathering".
upvoted 2 times
...
victorfs
1 year, 6 months ago
Selected Answer: C
The correct option is C. Elicitacion. Steve uses persuasion and manipulation to extract sensitive information from the victim. Where is the Quid pro quo? The victim dont get nothing!
upvoted 1 times
mikelpal
5 months, 1 week ago
**Answer is B. "he prompted the victim to execute unusual commands and install malicious files, which were then used to collect and pass critical information to Johnson’s machine."
upvoted 1 times
...
Tafulu
1 year, 3 months ago
I believe the quid pro quo here is hey your server is going to die, I'm technical support and will help you prevent this. I just need you to download these files and update the system so that I can fix it.
upvoted 2 times
...
...
jeremy13
1 year, 6 months ago
Selected Answer: B
same page as fortinetmaster => yeah we have the same book ;-)
upvoted 2 times
...
sausageman
1 year, 7 months ago
Selected Answer: B
B. Quid pro quo CEH Book v12 Module 09 Page 905 "Quid pro quo is a Latin phrase that meaning “something for something.” In this technique, attackers keep calling random numbers within a company, claiming to be calling from technical support. This is a baiting technique where attackers offer their service to end-users in exchange of confidential data or login credentials."
upvoted 4 times
...
eli117
1 year, 7 months ago
Selected Answer: B
B. Quid pro quo. In this technique, the attacker offers something of value, in this case, a warning about a compromised server, in exchange for access or information. In this case, Johnson offered to help the victim prevent an attack in progress, but in reality, he was using the opportunity to install malware and steal sensitive information.
upvoted 4 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...